Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time scheduling with MLFQ-RT multilevel feedback queue with starvation mitigation., and . ICE/ITMC, page 155-160. IEEE, (2017)Blue Skies from (X?s) Pain: A Digital Forensic Analysis of Threads and Bluesky., , and . ARES, page 201:1-201:12. ACM, (2024)Web Browser Extension User-Script XSS Vulnerabilities., , and . DASC/PiCom/CBDCom/CyberSciTech, page 316-321. IEEE, (2020)A novel Paradigm for Access Control Trust in IoT Applications: A Distributed Cross-Communication Approach., , and . WMNC, page 25-31. IEEE, (2021)Reconfigurable Packages for Low Cost Sensor Prototyping., , , , and . JCSSE, page 53-58. IEEE, (2020)Blind Attack Flaws in Adaptive Honeypot Strategies., , and . AIIoT, page 491-496. IEEE, (2021)Bioinformatics Resource Manager: a systems biology web tool for microRNA and omics data integration., , , , , , , , and . BMC Bioinform., 20 (1): 255 (December 2019)Intelligent Mitigation in Multilevel Feedback Queues., and . ACM Southeast Regional Conference, page 158-163. ACM, (2017)Two Factor Hash Verification (TFHV): A Novel Paradigm for Remote Authentication., and . ISNCC, page 1-4. IEEE, (2020)Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social., and . ICDF2C (1), volume 570 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 96-113. Springer, (2023)